I agree too. Nurturing young cyber talents is definitely a much better prospective then spending resources to hunt them down. As we heard from Mike Green’s presentation, the hacking community have their own culture. Young people who were drawn into hacking were immersed into the hacking culture. Most of these young hacker perform cyber attacks not…[Read more]

It is quite alarming how the large majority of the public willingly publicize their personal information online because they are are unaware of how the information they put out can be used against them. For example, as business school students, we know that our potential employers can easily look up our social media to have a glimpse of our…[Read more]

Thank you for sharing. That is interesting and useful indeed. However, the part about sharing your email address without permission may not be true. As we all know, whenever we sign up or register for something. There are always terms and condition that we agree to without reading. There may be something in the T&C that allows them to share your…[Read more]

The articles selected for this week are mostly focused on the soft skills required for our profession. After all, we are working with people, even thought we are IT Auditors. There are plenty of opinions regarding the so-called “Millennial” generation. This the generation you will most likely be working with as you mature in your career. How do…[Read more]

Based on Dr. Ed Glebstein, Ph.D. article “Is There Such a Thing as a Bad Auditor”, I believe that “The Bureaucrat” is the worst type from the standpoint of the auditee. The bureaucrat creates an illusion of work and activity being done but is in fact doing meaningless tasks that does not add value to the organization. Often times, the bur…[Read more]

Technology changes at mind-boggling speeds, and it greatly affects businesses and enterprises. What do you consider to be more important, depth of knowledge in technology, or its impact on the enterprise?

From a cyber security perspective, I believe that depth of knowledge in technology is more important. In the world of cyber security,…[Read more]

Yes, that is true. In this day and age, there are just too much data out there. Organizations who intend to use data will need to be able to weed out the important information from all the noise and draw reasonable conclusion from the information they gather. They should also not mistake correlation and causation and draw false conclusions.

Great article Mengting! It is scary to think that hackers can put civilian lives in danger by hacking driverless cars and especially airplanes. I am glad to see that companies are taking initiative to hire hackers to hack and find vulnerabilities in their our system.